零信任与医疗服务机构网络安全的未来

G. Gellert, Sean D. Kelly, Edwin W. Wright, Leslie C. Keil
{"title":"零信任与医疗服务机构网络安全的未来","authors":"G. Gellert, Sean D. Kelly, Edwin W. Wright, Leslie C. Keil","doi":"10.5430/jha.v12n1p1","DOIUrl":null,"url":null,"abstract":"Digital care transformation, the proliferation of disruptive technologies and the changing hybrid workforce have forced the evolution of traditional information technology network boundaries of healthcare organizations. The new landscape has rendered legacy existing perimeter defined and based cybersecurity solutions inadequate to meet increasing regulatory and federal demands for highly secure access management. Emerging compliance requirements, coupled with the concerning increase in healthcare data breaches, ransomware attacks, and security incidents targeting the healthcare sector, have transformed our historic notion of trust into an organizational vulnerability. A “Zero Trust” approach to information security is driven by an imperative to “never trust, always verify,” and requires strict, rigorous and continuous identity verification to minimize trust zones and their associated risk of security breach. Healthcare delivery organizations need to appreciate the importance of a Zero Trust strategy in reducing vulnerabilities, strengthening health system information security, and preventing successful security breaches, while also recognizing how identity and access management serves as the foundation of achieving Zero Trust.","PeriodicalId":15872,"journal":{"name":"Journal of Hospital Administration","volume":"5 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Zero Trust and the future of cybersecurity in healthcare delivery organizations\",\"authors\":\"G. Gellert, Sean D. Kelly, Edwin W. Wright, Leslie C. Keil\",\"doi\":\"10.5430/jha.v12n1p1\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Digital care transformation, the proliferation of disruptive technologies and the changing hybrid workforce have forced the evolution of traditional information technology network boundaries of healthcare organizations. The new landscape has rendered legacy existing perimeter defined and based cybersecurity solutions inadequate to meet increasing regulatory and federal demands for highly secure access management. Emerging compliance requirements, coupled with the concerning increase in healthcare data breaches, ransomware attacks, and security incidents targeting the healthcare sector, have transformed our historic notion of trust into an organizational vulnerability. A “Zero Trust” approach to information security is driven by an imperative to “never trust, always verify,” and requires strict, rigorous and continuous identity verification to minimize trust zones and their associated risk of security breach. Healthcare delivery organizations need to appreciate the importance of a Zero Trust strategy in reducing vulnerabilities, strengthening health system information security, and preventing successful security breaches, while also recognizing how identity and access management serves as the foundation of achieving Zero Trust.\",\"PeriodicalId\":15872,\"journal\":{\"name\":\"Journal of Hospital Administration\",\"volume\":\"5 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Hospital Administration\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5430/jha.v12n1p1\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Hospital Administration","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5430/jha.v12n1p1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

数字医疗转型、颠覆性技术的扩散和不断变化的混合劳动力迫使医疗保健组织的传统信息技术网络边界发生演变。新形势使得现有的基于边界定义的网络安全解决方案无法满足日益增长的监管和联邦政府对高度安全访问管理的需求。新出现的合规性需求,加上医疗保健数据泄露、勒索软件攻击和针对医疗保健部门的安全事件的增加,已经将我们的历史信任概念转变为组织漏洞。信息安全的“零信任”方法是由“永不信任,始终验证”的命令驱动的,并且需要严格、严格和持续的身份验证,以最大限度地减少信任区域及其相关的安全漏洞风险。医疗保健服务组织需要认识到零信任策略在减少漏洞、加强医疗系统信息安全性和防止成功的安全漏洞方面的重要性,同时也要认识到身份和访问管理是实现零信任的基础。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Zero Trust and the future of cybersecurity in healthcare delivery organizations
Digital care transformation, the proliferation of disruptive technologies and the changing hybrid workforce have forced the evolution of traditional information technology network boundaries of healthcare organizations. The new landscape has rendered legacy existing perimeter defined and based cybersecurity solutions inadequate to meet increasing regulatory and federal demands for highly secure access management. Emerging compliance requirements, coupled with the concerning increase in healthcare data breaches, ransomware attacks, and security incidents targeting the healthcare sector, have transformed our historic notion of trust into an organizational vulnerability. A “Zero Trust” approach to information security is driven by an imperative to “never trust, always verify,” and requires strict, rigorous and continuous identity verification to minimize trust zones and their associated risk of security breach. Healthcare delivery organizations need to appreciate the importance of a Zero Trust strategy in reducing vulnerabilities, strengthening health system information security, and preventing successful security breaches, while also recognizing how identity and access management serves as the foundation of achieving Zero Trust.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信